Vulnerabilities protected by our XSS: Cross Site Scripting firewall rule

15,606,270
Attacks Blocked in Past 24 Hours

Showing 81-100 of 7,093 Vulnerabilities

Title CVE ID CVSS Vector Date
Easy Coming Soon < 1.8.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting 7.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L August 24, 2015
Contact Form by FormGet < 5.3.1 - Authenticated Stored Cross-Site Scripting 7.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L March 7, 2015
WooCommerce <= 2.2.2 - Cross-Site Scripting via range Parameter CVE-2014-6313 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L September 15, 2014
Activity Log – Monitor & Record User Changes <= 2.11.1 - Unauthenticated Stored Cross-Site Scripting via Event Context CVE-2024-10788 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N November 20, 2024
WP Activity Log <= 5.2.1 - Unauthenticated Stored Cross-Site Scripting via User_id Parameter CVE-2024-10793 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N November 14, 2024
Slimstat Analytics <= 5.2.6 - Unauthenticated Stored Cross-Site Scripting CVE-2024-9548 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N October 14, 2024
LiteSpeed Cache <= 6.1 - Unauthenticated Stored Cross-Site Scripting CVE-2024-47374 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N September 30, 2024
123.chat - Video Chat <= 1.3.1 - Unauthenticated Stored Cross-Site Scripting CVE-2024-7869 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N September 30, 2024
Bit Form – Contact Form Plugin <= 2.13.10 - Unauthenticated Stored Cross-Site Scripting CVE-2024-47301 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N September 24, 2024
CubeWP Forms – All-in-One Form Builder <= 1.1.1 - Unauthenticated Stored Cross-Site Scripting CVE-2024-47300 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N September 24, 2024
GDPR Cookie Consent <= 2.6.0 - Unauthenticated Stored Cross-Site Scripting CVE-2024-8397 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N September 16, 2024
Super Store Finder <= 6.9.7 - Unauthenticated Stored Cross-Site Scripting CVE-2024-43975 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 28, 2024
Brickscore <= 1.4.2.5 - Unauthenticated Stored Cross-Site Scripting CVE-2024-43950 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 26, 2024
Music Request Manager <= 1.3 - Unauthenticated Stored Cross-Site Scripting CVE-2024-6019 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 22, 2024
RegistrationMagic <= 6.0.1.0 - Unauthenticated Stored Cross-Site Scripting CVE-2024-43317 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 16, 2024
Flaming Forms <= 1.0.1 - Unauthenticated Stored Cross-Site Scripting CVE-2024-7691 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 12, 2024
WP Fast Total Search <= 1.68.232 - Unauthenticated Stored Cross-Site Scripting CVE-2024-39663 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 1, 2024
RegistrationMagic <= 6.0.0.1 - Unauthenticated Stored Cross-Site Scripting CVE-2024-39643 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 1, 2024
LiquidPoll – Advanced Polls for Creators and Brands <= 3.3.77 - Unauthenticated Stored Cross-Site Scripting CVE-2024-39655 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N August 1, 2024
Redux Framework 4.4.12 - 4.4.17 - Unauthenticated JSON File Upload to Stored Cross-Site Scripting CVE-2024-6828 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N July 22, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation